资源描述:
《quantum key distribution》由会员上传分享,免费在线阅读,更多相关内容在行业资料-天天文库。
1、QuantumKeyDistributionHYSICSnApril27,1986,asatellitetelevisionbroadcasttotheeastcoastofR.J.Hughes,J.E.Nordholt,PtheU.S.wasbrieflytakenoverbyahackercallinghimself“CaptainC.G.Peterson,W.R.Scarlett,OMidnight.”Withthegrowingrelianceonsatellitesforcommunications,J.Anaya,D
2、.Derkacs,J.Franken,P.Hiskett,thisnotoriousincidenthighlightstheimportanceofassuredcommandW.J.Marshall,R.Sedillo,andcontroloforbitalassets,aswellasprotectionofdownlinkeddata.InC.Wipf(P-21),K.P.McCabe,1994,twoLANLresearchers,RichardHughesandJaneNordholt,setoutaTOMICI.B
3、ernstein,N.Dallman,methodologywherebyQKDusingsingle-photontransmissionscouldbeusedI.Medina,P.Montano,Atoprovidegreaterlong-termsecurity,basedonfundamentalprinciplesofN.Olivas,S.Storms,quantumphysics,forsecuresatellitecommunications.Sincethen,ourQKDJ.Thrasher,K.Tyagi,
4、teamhasbeenconductingresearchtowardthatgoal,andwehavedevelopedR.M.Whitaker(ISR-4),♦anothersecurecommunicationsconceptthatwouldbecomepossiblewithJ.Wren(ISR-2),P.MilonniasatelliteQKDcapability—securedatadisseminationbetweendynamically(T-DO),J.M.Ettinger,reconfigurablen
5、etworksofusers.1ThisresearchisleadingtoQKDbecomingM.Neergaard(N-3),D.Ranken,R.Guruleahigher-securityalternativetopresent-daypublic-key-cryptography-based(CCN-12)methodsofestablishingsecurecommunication—today’spublic-keybroadcasts,HYSICSwhichwemustassumearebeingrecord
6、edbyadversaries,willbecomeretroactivelyvulnerableifalarge-scalequantumcomputerbecomesfeasibleinPthefuture,potentiallyallowinganadversaryaccesstostill-valuableinformation.TheBasicsofCryptographyThescienceofcryptographyprovidestwoparties(“Alice”and“Bob”)withtheTOMICabi
7、litytocommunicatewithlong-termconfidentiality—theyhavetheassurancethatanythirdparty(aneavesdropper,“Eve”)willnotbeabletoreadtheirAmessages.Alicecanencryptamessage(“plaintext”),P,beforetransmittingittoBob,usingacryptographicalgorithm,E,toproducea“ciphertext,”C,which♦d
8、ependsonK,asecretparameterknownasacryptographickey.[Kisarandombinarynumbersequence,typicallyafewhundredbitsinlength.Forexample,inth